NET+
Which of the answers listed below refers to a binary representation of the decimal number 192? - 10101100 - 11000000 - 01100010 - 10101010
- 11000000
Which of the following answers lists the binary notation of the decimal number 252? - 11110010 - 11111000 - 11111010 - 11111100
- 11111100
Which of the TCP port numbers listed below is assigned to the Internet Message Access Protocol (IMAP)? - 143 - 389 - 443 - 636
- 143
What is the network address for the 154.24.67.147/22 host? - 154.24.48.0 - 154.24.60.0 - 154.24.62.0 - 154.24.64.0
- 154.24.64.0
Compared to SFP, SFP+ offers enhanced data transfer rates of up to: - 2 Gbps - 4 Gbps - 8 Gbps - 16 Gbps
- 16 Gbps
An SNMP Agent receives requests on UDP port: - 161 - 137 - 162 - 138
- 161
An SNMP management station receives SNMP notifications from Agents on UDP port: - 161 - 137 - 162 - 138
- 162
What is the last usable host IP address for the 172.45.120.0/23 network? - 172.45.120.254 - 172.45.121.254 - 172.45.122.254 - 172.45.123.254
- 172.45.121.254
Which of the following answers lists the decimal notation of the binary number 11100000? - 192 - 224 - 240 - 248
- 224
Which of the answers listed below refers to an IPv4 address range reserved for future use? - 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) - 172.16.0.0 - 172.31.255.255 (172.16.0.0/12) - 192.168.0.0 - 192.168.255.255 (192.0.0.0/24) - 240.0.0.0 - 255.255.255.254 (240.0.0.0/4)
- 240.0.0.0 - 255.255.255.254 (240.0.0.0/4)
Which of the following answers lists the default (classful) subnet mask for a class A network? - 255.0.0.0 - 255.128.0.0 - 224.0.0.0 - 255.224.0.0
- 255.0.0.0
What is the dot-decimal representation of a /13 subnet mask? - 255.240.0.0 - 255.248.0.0 - 255.252.0.0 - 255.254.0.0
- 255.248.0.0
Which of the following answers lists the default (classful) subnet mask for a class B network? - 255.252.0.0 - 255.255.0.0 - 255.248.0.0 - 255.224.0.0
- 255.255.0.0
Which of the following ports is used by syslog? - 445 - 514 - 587 - 636
- 514
TCP port 25 is used by: - SNMP - Telnet - FTP - SMTP
- SMTP
Which of the following TCP flags are used for establishing a network connection via TCP three-way handshake? (Select 2 answers) - RST - SYN - FIN - ACk - URG
- SYN - ACK
Which of the following answers refer(s) to the POP3S encrypted communication? (Select all that apply) - TCP port 993 - Secure Sockets Layer (SSL) - TCP port 995 - Transport Layer Security (TLS) - TCP port 110
- Secure Sockets Layer (SSL) - TCP port 995 - Transport Layer Security (TLS)
In the OSI model, the layer 4 TCP PDU is known as: - Bit - Frame - Packet - Segment - Datagram
- Segment
A network topology in which each node has a direct physical connection to every other node is called: - Star - Bus - Mesh - Ring
- Mesh
Which type of network topology provides the highest level of redundancy? - Ring - Mesh - Bus - Star
- Mesh
What are the features of GBIC? (Select all that apply) - Data transfer of 10 Gbps - Modular (hot swappable) interface - Converts optical signals to electrical signals - Fixed physical interface - Converts electrical signals to optical signals - Data transfer of 1 Gbps
- Modular (hot swappable) interface - Converts optical signals to electrical signals - Converts electrical signals to optical signals - Data transfer of 1 Gbps
A type of network traffic intended for a particular group of hosts is called: - Unicast - Anycast - Multicast - Broadcast
- Multicast
Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address? - DNS - APIPA - NAT - DHCP
- NAT
The FTP's Control Connection for administering a session is established through: - TCP port 20 - UDP port 20 - TCP port 21 - UDP port 21
- TCP port 21
Which of the following ports is used by HTTPS? - TCP port 80 - TCP port 443 - UDP port 53 - TCP port 143
- TCP port 443
Which of the ports listed below are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers) - UDP port 67 - TCP port 5060 - TCP port 389 - UDP port 68 - TCP port 5061 - TCP port 3389
- TCP port 5060 - TCP port 5061
UDP port 69 is assigned to: - TFTP - SNMP - DHCP - LDAP
- TFTP
An IPv4-to-IPv6 transition mechanism with native support for Network Address Translation (NAT) is known as: - 6to4 - Teredo - eDiscovery - Miredo
- Teredo
What does the term "Miredo" refer to? - IPv4 to IPv6 migration mechanism - Load balancing solution - Teredo tunneling software - Content filtering solution
- Teredo tunneling software
Which of the following answers refers to a modular network device designed to provide a seamless link between different types of network interfaces? - Bridge - Transceiver - Active hub - Managed switch
- Transceiver
Layer 4 of the OSI model is also known as: - Network layer - Data link layer - Session layer - Transport layer
- Transport layer
An IPsec mode providing encryption only for the payload (the data part of the packet) is known as: - Protected mode - Tunnel mode - Transport mode - Safe mode
- Transport mode
What are the characteristic features of the RJ45 connector? (Select 2 answers) - Used with telephone cabling - Coaxial cabling connector - Used with Ethernet network cabling - Twisted-pair copper cabling connector - Fiber-optic cabling connector
- Used with Ethernet network cabling - Twisted-pair copper cabling connector
Which of the following answers lists the CIDR notation of the 255.192.0.0 subnet mask? - /10 - /11 - /12 - /13
- /10
Which of the following answers lists the CIDR notation for 255.255.224.0 subnet mask? - /19 - /20 - /21 - /22
- /19
Which of the following answers lists the CIDR notation of the 255.255.255.224 subnet mask? - /25 - /26 - /27 - /28
- /27
Which of the following answers refer to IPv6 loopback addresses? (Select 2 answers) - 127.0.0.1 - 0:0:0:0:0:0:0:1 - 169.254/16 - ::1 - FE80::/10
- 0:0:0:0:0:0:0:1 - ::1
Which of the answers listed below refer(s) to the characteristic features of the 10GBASE-T Ethernet standard? - Single-mode fiber-optic cable - 10 Gbps transfer rate over a maximum cable segment length of 55 meters (Cat 6 UTP cable) - Uses two pairs of wires in a cable for data transmission - Multimode fiber-optic cable - 10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6 STP cable) - Twisted-pair copper cabling - 10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6a UTP/STP cable) - Uses all four pairs of wires in a cable for data transmission
- 10 Gbps transfer rate over a maximum cable segment length of 55 meters (Cat 6 UTP cable) - 10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6 STP cable) - Twisted-pair copper cabling - 10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6a UTP/STP cable) - Uses all four pairs of wires in a cable for data transmission
What is the first valid host address for a node residing in the 10.119.136.143/20 network? - 10.119.96.1 - 10.119.128.1 - 10.119.132.1 - 10.119.136.1
- 10.119.128.1
What is the first valid host address that can be assigned to a node residing in the 10.119.136.143/20 network? - 10.119.96.1 - 10.119.128.1 - 10.119.132.1 - 10.119.136.1
- 10.119.128.1
Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5 (Cat 5) cabling? (Select all that apply) - Coaxial cabling - 100 Mbps transfer rate over 2 cable pairs (100BASE-T networks) - F-type connector - 55-meter cable segment length - 1 Gbps transfer rate over all 4 cable pairs (1000BASE-T networks) - BNC connector - 100-meter cable segment length - 10 Gbps transfer rate over all 4 cable pairs (10GBASE-T networks) - Twisted-pair copper cabling - RJ45 connector - Fiber-optic cabling
- 100 Mbps transfer rate over 2 cable pairs (100BASE-T networks) - 1 Gbps transfer rate over all 4 cable pairs (1000BASE-T networks) - 100-meter cable segment length - Twisted-pair copper cabling - RJ45 connector
What is the typical cable segment length for a copper twisted-pair Ethernet cable? - 33 meters - 55 meters - 100 meters - 250 meters
- 100 meters
Which of the following answers describe(s) to the characteristics of Category 5e (Cat 5e) cabling? (Select all that apply) - BNC connector - 100-meter cable segment length - Coaxial cabling - Twisted-pair copper cabling - Fiber-optic cabling - 1 Gbps transfer rate over 2 cable pairs (1000BASE-T networks) - RJ45 connector - 55-meter cable segment length - 1 Gbps transfer rate over all 4 cable pairs (1000BASE-T networks) - F-type connector
- 100-meter cable segment length - Twisted-pair copper cabling - RJ45 connector - 1 Gbps transfer rate over all 4 cable pairs (1000BASE-T networks)
What is the binary representation of the 255.254.0.0 subnet mask? - 11111111.11111100.00000000.00000000 - 11111111.11111110.00000000.00000000 - 11111111.11111101.00000000.00000000 - 11111111.11111000.00000000.00000000
- 11111111.11111110.00000000.00000000
What is the binary representation of the 255.255.128.0 subnet mask? - 11111111.11111111.10000000.00000000 - 11111111.11111111.11000000.00000000 - 11111111.11111111.11100000.00000000 - 11111111.11111111.11110000.00000000
- 11111111.11111111.10000000.00000000
Network Time Protocol (NTP) runs on UDP port: - 123 - 110 - 161 - 137
- 123
Which of the following answers refers to an IPv4 address range used for loopback addresses? - 0.0.0.0 - 0.255.255.255 (0.0.0.0/8) - 127.0.0.0 - 127.255.255.255 (127.0.0.0/8) - 169.254.0.0 - 169.254.255.255 (169.254.0.0/16) - 240.0.0.0 - 255.255.255.254 (240.0.0.0/4)
- 127.0.0.0 - 127.255.255.255 (127.0.0.0/8)
Which of the following answers refers to an IPv4 loopback address? - ::1 - FE80::/10 - 0:0:0:0:0:0:0:1 - 169.254/16 - 127.0.0.1
- 127.0.0.1
What is the leading octet value range for an IPv4 address belonging to a class B network? - 128 - 191 - 1 - 126 - 192 - 223 - 224 - 239
- 128 - 191
What is the leading octet value range for an IPv4 address belonging to a class B network? - 240 - 254 - 128 - 191 - 1 - 126 - 192 - 223 - 224 - 239
- 128 - 191
An IPv6 address consists of: - 32 bits - 48 bits - 64 bits - 128 bits
- 128 bits
A networked host with unknown IPv4 address can be reached via: - Unicast - Anycast - Multicast - Broadcast
- Broadcast
A type of network that interconnects multiple LANs within a limited geographical area is known as: - BAN - CAN - SAN - RAN
- CAN
Which of the answers listed below refers to a solution that replaces the classful network design? - VLAN - RSTP - SNAT - CIDR
- CIDR
What is the maximum valid range for IP addresses that can be assigned to hosts on the 134.170.185.46 255.255.128.0 network? - 134.170.128.1 - 134.170.255.254 - 134.170.128.1 - 134.170.191.254 - 134.170.160.1 - 134.170.191.254 - 134.170.176.1 - 134.170.191.254
- 134.170.128.1 - 134.170.255.254
Which of the following port numbers is used by the Microsoft Structured Query Language (SQL) Server? - 1433 - 1521 - 3306 - 3389
- 1433
SQLnet runs on port: - 587 - 993 - 1433 - 1521
- 1521
What is the network address for a 154.24.67.147/22 host? - 154.24.48.0 - 154.24.60.0 - 154.24.62.0 - 154.24.64.0
- 154.24.64.0
Which of the following answers lists a decimal notation of the binary number 10101100? - 168 - 172 - 192 - 224
- 172
What is the first usable host IP address on the 172.26.56.110/27 network? - 172.26.56.97 - 172.26.56.111 - 172.26.56.126 - 172.26.56.127
- 172.26.56.97
What is the maximum valid range for IP addresses that can be assigned to hosts on the 192.168.100.248 255.255.255.248 network? - 192.168.100.249 - 192.168.100.255 - 192.168.100.248 - 192.168.100.254 - 192.168.100.249 - 192.168.100.254 - 192.168.100.248 - 192.168.100.255
- 192.168.100.249 - 192.168.100.254
What is the network address for the 192.168.223.15 255.255.255.252 host? - 192.168.223.10 - 192.168.223.11 - 192.168.223.12 - 192.168.223.13
- 192.168.223.12
What is the last usable host IP address on the 192.168.32.9/30 network? - 192.168.32.9 - 192.168.32.10 - 192.168.32.11 - 192.168.32.12
- 192.168.32.10
Which of the following answers lists the broadcast address for the 192.168.50.155/20 network? - 192.168.31.255 - 192.168.47.255 - 192.168.63.255 - 192.168.79.255
- 192.168.63.255
Which of the following answers refers to a valid IPv6 EUI-64 format address generated from a MAC address of 29:88:68:0B:1B:CA? - 2001:DB8:ABCD:12:2A88:68FF:FE0B:1BCA - 2001:DB8:ABCD:12:2B88:68FF:FE0B:1BCA - 2001:DB8:ABCD:12:2C88:68FF:FE0B:1BCA - 2001:DB8:ABCD:12:2D88:68FF:FE0B:1BCA
- 2001:DB8:ABCD:12:2B88:68FF:FE0B:1BCA
Which of the following answers refer to the leading octet value range and class of the IPv4 multicast address block? (Select 2 answers) - 128 - 191 - Class B - 192 - 223 - Class C - 224 - 239 - Class D
- 224 - 239 - Class D
Which of the following answers refer to the IPv4 multicast address block? (Select 2 answers) - 128 - 191 - Class B range - 192 - 223 - Class C range - 224 - 239 - Class D range
- 224 - 239 - Class D range
Which of the TCP ports listed below is used by Telnet? - 20 - 21 - 22 - 23
- 23
Which of the answers listed below refers to the default (classful) subnet mask for a class C network? - 255.255.192.0 - 255.255.224.0 - 255.255.255.0 - 255.255.252.0
- 255.255.255.0
An IPv4 address consists of: - 32 bits - 48 bits - 64 bits - 128 bits
- 32 bits
Which of the following answers refers to a port number assigned to the MySQL database system? - 1433 - 1521 - 3306 - 3389
- 3306
Which of the following answers refers to the maximum data transfer rate of QSFP? - 1 Gbps - 1.6 Gbps - 2 Gbps - 4 Gbps
- 4 Gbps
QSFP+ offers data transfer rates of up to: - 10 Gbps - 20 Gbps - 40 Gbps - 80 Gbps
- 40 Gbps
What is the maximum number of hosts per subnet for the 10.47.255.1/20 network? - 512 hosts - 1022 hosts - 2046 hosts - 4094 hosts
- 4094 hosts
Which of the following answers lists the broadcast address for the 46.28.247.109/10 network? - 46.31.255.255 - 46.63.255.255 - 46.127.255.255 - 46.255.255.255
- 46.63.255.255
Which of the following ports is assigned to the Domain Name System (DNS)? - 53 - 67 - 110 - 389
- 53
SMTP TLS runs on port: - 445 - 514 - 587 - 636
- 587
How many usable IP addresses can be assigned to hosts on a /26 subnet? - 254 - 126 - 62 - 30
- 62
A network administrator wants to secure the existing access to a directory service with SSL/TLS encryption. Which of the following TCP ports needs to be opened to implement this change? - 636 - 389 - 443 - 1720
- 636
A limited IPv4-to-IPv6 transition mechanism that allows for encapsulation of IPv6 packets in IPv4 packets transmitted over IPv4 networks is referred to as: - 6to4 - 802.3af - eDiscovery - Miredo
- 6to4
What is the maximum number of subnets and hosts per subnet for the 192.168.50.247 255.255.255.224 network? - 2 subnets, 126 hosts per subnet - 4 subnets, 62 hosts per subnet - 8 subnets, 30 hosts per subnet - 16 subnets, 14 hosts per subnet
- 8 subnets, 30 hosts per subnet
Which part of the IPsec protocol suite provides authentication and integrity? - CRC - AH - SIEM - AES
- AH
An IPv6 link-local address is an equivalent of IPv4's: - APIPA address - Routable IP address - Public IP address - MAC address
- APIPA address
Which of the following answers refers to an IPv6-only, one-to-nearest data transmission type? - Unicast - Anycast - Multicast - Broadcast
- Anycast
Which of the following answers refer to the characteristics of Category 8 (Cat 8) cabling? (Select 3 answers) - Designed for long-distance, high-speed links - 100GBASE-T - Appropriate for connecting datacenter equipment - Designed for short-distance (approx. 30 meters), high-speed links - 40GBASE-T - Appropriate for wide range of cabling infrastructures
- Appropriate for connecting datacenter equipment - Designed for short-distance (approx. 30 meters), high-speed links - 40GBASE-T
In the OSI model, the physical layer PDU is known as: - Bit - Frame - Packet - Segment - Datagram
- Bit
Which of the following answers refers to a recommended minimum requirement for twisted-pair copper cabling in 1000BASE-T networks? - Cat 3 - Cat 5 - Cat 5e - Cat 6 - Cat 6a
- Cat 5e
In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to the: - Class A address space - Class B address space - Class C address space - Class D address space
- Class A address space
In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to the: - Class A address space - Class B address space - Class C address space - Class D address space - Class E address space
- Class A address space
Which of the following answers refer to the characteristic features of the 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) IPv4 address space? (Select 2 answers) - Class A range - Public IP address range - Class B range - Non-routable (private) IP address range - Class C range
- Class A range - Non-routable (private) IP address range
Which of the following answers refer to the characteristic features of the 10.0.0.0 - 10.255.255.255 IPv4 address space? (Select 2 answers) - Class A range - Public IP address range - Class B range - Non-routable (private) IP address range - Class C range
- Class A range - Non-routable (private) IP address range
Which of the answers listed below refer to the 172.16.0.0 - 172.31.255.255 (172.16.0.0/12) IPv4 address space? (Select 2 answers) - Class A range - Public IP address range - Class B range - Non-routable (private) IP address range - Class C range
- Class B range - Non-routable (private) IP address range
Which of the following answers list the characteristic features of the 172.16.0.0 - 172.31.255.255 IPv4 address space? (Select 2 answers) - Class A range - Public IP address range - Class B range - Non-routable (private) IP address range - Class C range
- Class B range - Non-routable (private) IP address range
In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to the: - Class A address space - Class B address space - Class C address space - Class D address space
- Class C address space
In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to the: - Class A address space - Class B address space - Class C address space - Class D address space - Class E address space
- Class C address space
Which of the following answers refer to the RG-6 cabling specification? (Select 3 answers) - Twisted-pair copper cabling - Suitable for short-distance cable runs - Used for analog video and CCTV installations - Coaxial cabling - Suitable for long-distance cable runs - Used for cable television, satellite television, and cable modems
- Coaxial cabling - Suitable for long-distance cable runs - Used for cable television, satellite television, and cable modems
What are the characteristics of the RG-59 cabling specification? (Select 3 answers) - Coaxial cabling - Suitable for short-distance cable runs - Used for analog video and CCTV installations - Twisted-pair copper cabling - Suitable for long-distance cable runs - Used for cable television, satellite television, and cable modems
- Coaxial cabling - Suitable for short-distance cable runs - Used for analog video and CCTV installations
Shielded Twisted-Pair (STP) cabling reduces what kind of interference? (Select 2 answers) - Jitter - Signal attenuation - Crosstalk - EMI - Signal latency
- Crosstalk - EMI
A network protocol providing an alternative solution to the manual allocation of IP addresses is called: - DNS - SNMP - NAT - DHCP
- DHCP
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? - TCP/IP - DNS - SQL - DHCP
- DNS
Layer 2 of the OSI model is also referred to as: - Transport layer - Network layer - Data link layer - Physical layer
- Data link layer
In the OSI model, the layer 4 UDP PDU is called: - Bit - Frame - Packet - Segment - Datagram
- Datagram
IPv4 addresses are expressed with the use of: - Octagonal numbers - Binary numbers - Hexadecimal numbers - Decimal numbers
- Decimal numbers
LDAP is an example of: - Authentication protocol - Address resolution protocol - Directory access protocol - File exchange protocol
- Directory access protocol
Which part of IPsec provides authentication, integrity, and confidentiality? - AES - SHA - AH - ESP
- ESP
POP3 is used for: - Name resolution - Sending email messages - File exchange - Email retrieval
- Email retrieval
A type of coaxial connector commonly used for cable television and cable modems is called: - RG-6 - F-type - DB-9 - MT-RJ
- F-type
Which of the answers listed below refers to an IPv6 link-local address? - 2002::/16 - FE80::/10 - 2001::/32 - ::1/128
- FE80::/10
Which of the following answers lists a valid IPv6 address of FE80:00A7:0000:0000:02AA:0000:4C00:FE9A after compression? - FE80:00A7::2AA:0:4C:FE9A - FE80:A7::2AA::4C00:FE9A - FE80:00A7::2AA:0:4C00:FE9A - FE80:A7::2AA:0:4C00:FE9A
- FE80:A7::2AA:0:4C00:FE9A
In the context of the OSI model, the term "Data encapsulation" is used to describe a process where each layer of the OSI model adds its own control information to the original data that is being passed across the layers from the physical layer up to the application layer. - True - False
- False
Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol. - True - False
- False
Which of the following answers does not refer to the characteristics of twinaxial cabling? - Coaxial cabling - Two inner conductors - Very-short-range high-speed connections - Copper cabling - Long-distance cable runs
- Long-distance cable runs
Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP does not support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol. Example applications of TCP include transmission of video and audio streaming data. - True - False
- False
User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). Example applications of UDP include transmission of text and image data. - True - False
- False
User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required to establish network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). - True - False
- False
What is the function of FTP? - Email service - Directory access - Serving of web pages - File exchange
- File exchange
In the OSI model, the layer 2 PDU is called: - Bit - Frame - Packet - Segment - Datagram
- Frame
Which of the following answers refers to a tunneling protocol? - VRRP - GRE - RTSP - BGP
- GRE
Which network protocol enables retrieving contents of an Internet page from a web server? - SNMP - HTTP - SMTP - IMAP
- HTTP
Which of the following protocols reside(s) at the application layer of the OSI model? (Select all that apply) - ATM - HTTP - FTP - IP - SMTP - TCP/UDP
- HTTP - FTP - SMTP
What is the name of a network protocol that secures web traffic via SSL/TLS encryption? - SFTP - HTTPS - FTPS - SNMP
- HTTPS
IPv6 addresses are expressed with the use of: - Octagonal numbers - Binary numbers - Hexadecimal numbers - Decimal numbers
- Hexadecimal numbers
Which of the following reside at the physical layer of the OSI model? (Select 3 answers) - IP address - Network switch - Hub - Router - Network cabling - Ethernet frame - Repeater
- Hub - Network cabling - Repeater
Which of the following reside at the physical layer of the OSI model? (Choose 3) - IP Address - Network Switch - Hub - Router - Network Cabling - Ethernet frame - Repeater
- Hub - Network Cabling - Repeater
A network topology where each node connects to a central switching device is known as: (Select 2 answers) - Hub-and-spoke - Bus - Ring - Star - Mesh
- Hub-and-spoke - Star
TCP port 80 is assigned to: - Hypertext Transfer Protocol (HTTP) - Hypertext Transfer Protocol over TLS/SSL (HTTPS) - Internet Message Access Protocol (IMAP) - Lightweight Directory Access Protocol (LDAP)
- Hypertext Transfer Protocol (HTTP)
Which of the following answers refers to a protocol used by routers, hosts, and network devices to generate error messages and troubleshoot problems with delivery of IP packets? - CCMP - RSTP - ICMP - SNMP
- ICMP
WHat is the name of a network layer protocol that specifies the format of packets and IP addressing scheme in network communications? - UDP - IP - TCP - NetBIOS
- IP
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? - UDP - IP - TCP - NetBIOS
- IP
Which of the following answers refers to a proprietary European alternative to 110 block? - Krone - BIX - M Block - IDC
- Krone
A type of network connecting computers within a small geographical area such as a building or group of buildings is called: - PAN - LAN - MAN - WAN
- LAN
Which of the following answers refer(s) to example(s) of fiber-optic connectors? (Select all that apply) - LC - DB-25 - ST - SC - RG-6
- LC - ST - SC - MT-RJ
TCP port 389 is the default network port for: - RDP - LDAP - SMB - LDAPS
- LDAP
Which of the following answers refers to an SSL/TLS-based directory access protocol? - H.323 - PPTP - Kerberos - LDAPS
- LDAPS
Physical layer of the OSI model is also known as: - Layer 2 - Layer 7 - Layer 1 - Layer 4
- Layer 1
Which of the following terms refers to the OSI network layer? - Layer 2 - Layer 5 - Layer 3 - Layer 4
- Layer 3
Which of the following answers does not refer to the OSI TCP segment header? - Layer 4 header - Source port number - Destination port number - Layer 3 header - Sequence number - Checksum field
- Layer 3 header
Which of the following answers does not refer to the OSI UDP datagram header? - Length in bytes - Destination port number - Layer 4 header - Source port number - Checksum field - Layer 3 header
- Layer 3 header
The term "Presentation layer" refers to: - Layer 7 of the OSI model - Layer 5 of the OSI model - Layer 6 of the OSI model - Layer 4 of the OSI model
- Layer 6 of the OSI model
The application layer of the OSI model is also known as: - Layer 1 - Layer 3 - Layer 6 - Layer 7
- Layer 7
Which of the following statements apply to Peer-to-Peer (P2P) networking? (Select 3 answers) - In P2P networks, a network node can only request resources - Centralized network type - Less stable and secure than client-server networking model - Decentralized network type - In P2P networks, each node can at the same time serve and request resources - More stable and secure than client-server networking model
- Less stable and secure than client-server networking model - Decentralized network type - In P2P networks, each node can at the same time serve and request resources
A type of protocol used in network management systems for monitoring network-attached devices is known as: - SMB - NTP - SNMP - RDP
- SNMP
What are the characteristic components of the OSI data link layer? - MAC address - IP packet - Network switch - Router - Network cabling - Ethernet frame
- MAC address - Network switch - Ethernet frame
What are the characteristic components of the OSI data link layer? (Select 3 answers) - MAC address - IP packet - Network switch - Router - Network cabling - Ethernet frame
- MAC address - Network switch - Ethernet frame
A computer network connecting multiple LANs over an area of a city is referred to as: - PAN - SAN - WAN - CAN
- MAN
A limit on the maximum amount of data that can be transmitted over a network without fragmentation is referred to as: - DSU - CSU - Data payload - MTU
- MTU
What are the characteristics of the 1000BASE-SX Ethernet standard? (Select 2 answers) - Single-mode fiber-optic cabling - Maximum cable segment length between 220 and 550 meters - Multimode fiber-optic cabling - Maximum cable segment length of 185 meters - Twisted-pair copper cabling
- Maximum cable segment length between 220 and 550 meters - Multimode fiber-optic cabling
What are the characteristic features of the 100BASE-TX Ethernet standard? (Select 3 answers) - Twisted-pair copper cabling (Category 3 or higher) - Maximum cable segment length of 100 meters - Transfer rate of 100 Mbps over two-pair Cat 5 or better cable - Maximum cable segment length of 55 meters - Twisted-pair copper cabling (Category 5 or higher) - Transfer rate of 1000 Mbps (1 Gbps) over four-pair Cat 5 or better cable
- Maximum cable segment length of 100 meters - Transfer rate of 100 Mbps over two-pair Cat 5 or better cable - Twisted-pair copper cabling (Category 5 or higher)
What are the characteristic features of the 1000BASE-T Ethernet standard? (Select 3 answers) - Maximum cable segment length of 185 meters - Single-mode fiber-optic cabling - Maximum cable segment length of 100 meters - Twisted-pair copper cabling (Cat 5 or higher) - Uses two pairs of wires in a cable for data transmission - Multimode fiber-optic cabling - Uses all four pairs of wires in a cable for data transmission
- Maximum cable segment length of 100 meters - Twisted-pair copper cabling (Cat 5 or higher) - Uses all four pairs of wires in a cable for data transmission
What are the characteristic features of the 100BASE-FX Ethernet standard? (Select 3 answers) - Maximum cable segment length of up to 412 meters (half-duplex communication) - Multimode fiber - Maximum cable segment length of up to 2 kilometers (full-duplex communication) - Single-mode fiber - Maximum cable segment length of up to 5 kilometers (full-duplex communication)
- Maximum cable segment length of up to 412 meters (half-duplex communication) - Multimode fiber - Maximum cable segment length of up to 2 kilometers (full-duplex communication)
Which of the answers listed below refer to the 1000BASE-LX Ethernet standard? (Select 3 answers) - Twisted-pair copper cabling - Transfer rate of 1 Gbps over two-pair Cat 5e or better cable - Maximum cable segment length of up to 5 kilometers over single-mode fiber - Fiber-optic cabling - Maximum cable segment length of 100 meters - Transfer rate of 1 Gbps over four-pair Cat 5e or better cable - Maximum cable segment length of up to 550 meters over multimode fiber
- Maximum cable segment length of up to 5 kilometers over single-mode fiber - Fiber-optic cabling - Maximum cable segment length of up to 550 meters over multimode fiber
A network link consisting of two dissimilar transmission medium types requires an intermediary device known as: - Coupler - Patch panel - Content filter - Media converter
- Media converter
What are the characteristic traits of single-mode fiber optics? (Select 3 answers) - Transmission distances of up to 2 km - More expensive than multimode fiber optics - Transmission distances of up to 100 km - Uses laser as the source of light - Less expensive than multimode fiber optics
- More expensive than multimode fiber optics - Transmission distances of up to 100 km - Uses laser as the source of light
Which of the following answers can be used to describe client-server architecture? (Select 3 answers) - Less stable and secure than peer-to-peer architecture - More reliable than peer-to-peer architecture - Decentralized network type - Each network node can at the same time serve and request resources - More stable and secure than peer-to-peer architecture - Centralized network type - Less reliable than peer-to-peer architecture
- More stable and secure than peer-to-peer architecture - Centralized network type - Less reliable than peer-to-peer architecture
Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device? - QoS - DHCP - NAT - DNS
- NAT
An IPv6 protocol used by routers to advertise their presence on a network is called: - NDR - NCP - NDP - NTP
- NDP
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? - NTP - VTP - NNTP - RTP
- NTP
Compared to the number of all IPv4 addresses available per subnet, the total number of usable IPv4 addresses that can be assigned to hosts from that pool is reduced by two. Those two addresses that cannot be assigned to hosts are used as: (Select 2 answers) - Network address - Unicast address - Broadcast address - Multicast address
- Network address - Broadcast address
Which of the following answers can be used to describe the characteristics of ring topology? (Select 3 answers) - All network nodes connect to a single central cable (a.k.a. backbone or trunk) - Network nodes are daisy-chained in a closed loop - A terminator at each end of the main network cable prevents collisions caused by signal bounce - Data is passed through each intermediate node until the receiver node is reached - Each network node connects to exactly two other nodes - The main network cable becomes a single point of failure
- Network nodes are daisy-chained in a closed loop - Data is passed through each intermediate node until the receiver node is reached - Each network node connects to exactly two other nodes
What are the characteristic features of the 192.168.0.0 - 192.168.255.255 (192.0.0.0/16) IPv4 address space? (Select 2 answers) - Class A range - Public IP address range - Class B range - Non-routable (private) IP address range - Class C range
- Non-routable (private) IP address range - Class C range
Which of the following answers list the characteristic features of the 192.168.0.0 - 192.168.255.255 IP address space? (Select 2 answers) - Class A range - Public IP address range - Class B range - Non-routable (private) IP address range - Class C range
- Non-routable (private) IP address range - Class C range
In modern Ethernet networks, a twisted-pair copper cable terminated according to the TIA/EIA-568A standard on one end and TIA/EIA-568B standard on the opposite end forms a: - Crossover cable - Straight-through cable - Patch cable - None of the above
- None of the above
Which of the answers listed below refers to an example of a valid subnet mask? - 255.255.225.0 - 255.255.191.0 - 255.255.127.0 - 255.255.64.0 - None of the above is a valid subnet mask
- None of the above is a valid subnet mask
Which of the following is an example of a valid subnet mask? - 255.255.225.0 - 255.255.191.0 - 255.255.127.0 - 255.255.64.0 - None of the above is a valid subnet mask
- None of the above is a valid subnet mask
Which of the following answers refer to IMAP4? (Select 2 answers) - Offers improved functionality in comparison to POP3 - Serves the same function as POP3 - Enables sending email messages from client devices - Offers less functions than POP3 - Enables email exchange between mail servers
- Offers improved functionality in comparison to POP3 - Serves the same function as POP3
A type of limited-range computer network used for data transmission among various types of personal devices is referred to as: - PAN - LAN - SAN - MAN
- PAN
Which of the following answers refers to a method that binds a combination of private IP address and port number with a corresponding public IP address and port information? - PAT - NAC - DNS - ARP
- PAT
In the OSI model, the layer 3 PDU is known as: - Bit - Frame - Packet - Segment - Datagram
- Packet
A simple device consisting of multiple connector blocks and ports used for cable management is known as: - Media converter - Demarc - Main Distribution Frame (MDF) - Patch panel
- Patch panel
Data format translation, data compression, and data encryption/decryption take place at the: - Application layer of the OSI model - Presentation layer of the OSI model - Session layer of the OSI model - Transport layer of the OSI model
- Presentation layer of the OSI model
What are the characteristic features of TFTP? (Select 2 answers) - Provides no security features - Typically used for exchanging files over the Internet - A very basic form of file sharing protocol - Provides authentication and encryption - Directory access protocol
- Provides no security features - A very basic form of file sharing protocol
What are the characteristics of SMB/CIFS? (Select all that apply) - Used mainly by computers running Linux distributions - Provides shared access to files, directories, and devices - Used mainly by computers running Microsoft Windows operating systems - Enables voice and multimedia communications over IP networks
- Provides shared access to files, directories, and devices - Used mainly by computers running Microsoft Windows operating systems
Telnet: (Select 3 answers) - Encrypts network connection - Provides username & password authentication - Transmits data in an unencrypted form - Does not provide authentication - Enables remote login and command execution
- Provides username & password authentication - Transmits data in an unencrypted form - Enables remote login and command execution
Which of the following answers refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network? - RDP - SSH - VNC - Telnet
- RDP
Which of the following documents describes the concept of private IP addressing? - RFC 4949 - RFC 1918 - RFC 1208 - RFC 1983
- RFC 1918
Which of the following answers refer to the OSI network layer components? (Select 3 answers) - Router - Ethernet frame - IP address - TCP/UDP protocols - Packet - Network switch
- Router - IP address - Packet
Which of the following answers refer to the OSI network layer components? - Router - Ethernet frame - IP address - TCP/UDP protocols - Packet - Network switch
- Router - IP address - Packet
A dedicated local network consisting of devices providing data access is called: - SDN - NAS - iSCSI - SAN
- SAN
Which of the following answers refers to a solution that simplifies large network infrastructure management through the use of software? - mGRE - SDWAN - MPLS - EIGRP
- SDWAN
A network protocol for secure file transfer over Secure Shell (SSH) is called: - TFTP - SFTP - Telnet - FTPS
- SFTP
Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? - L2TP - BGP - RSTP - SIP
- SIP
Which of the following allows a network node to autoconfigure an IPv6 address in the absence of a Dynamic Host Configuration Protocol for IPv6 (DHCPv6) server? - APIPA - CIDR - NetBEUI - SLAAC
- SLAAC
Which of the following protocols runs on TCP port 445? - HTTPS - SMB/CIFS - IMAP - H.323
- SMB/CIFS
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as: - TFTP - SSH - Telnet - RDP
- SSH
Which of the answers listed below refers to a secure replacement for Telnet? - CHAP - FTP - SNMP - SSH
- SSH
Unblocking TCP port 22 enables what type of traffic? (Select 2 answers) - FTPS - SSH - SFTP - FTP - HTTP
- SSH - SFTP
What are the characteristic features of the secure version of IMAP? (Select all that apply) - TCP port 143 - Secure Sockets Layer (SSL) - TCP port 993 - Transport Layer Security (TLS) - TCP port 995
- Secure Sockets Layer (SSL) - TCP port 993 - Transport Layer Security (TLS)
The SMTP protocol is used for: (Select 2 answers) - Sending email messages between mail servers - Name resolution services - Serving of web pages - Retrieving email messages from mail servers - Sending email messages from a client device
- Sending email messages between mail servers - Sending email messages from a client device
Authentication and authorization take place at what layer in the OSI model? - Application layer - Network layer - Session layer - Presentation layer
- Session layer
Layer 5 of the OSI model is also referred to as what?
- Session layer
Layer 5 of the OSI model is also referred to as: - Session layer - Application layer - Transport layer - Presentation layer
- Session layer
Which OSI layer assumes th responsibility fo opening, closing and maintaining connections between applications? - Network layer - Data link layer - Apllication layer - Session layer
- Session layer
Which OSI layer assumes the responsibility for opening, closing, and maintaining connections between applications? - Network layer - Data link layer - Application layer - Session layer
- Session layer
Authentication and authorization take place at the: - Application layer of the OSI model - Network layer of the OSI model - Session layer of the OSI model - Presentation layer of the OSI model
- Session layer of the OSI model
Which of the answers listed below refer(s) to the characteristic feature(s) of SFP? (Select all that apply) - Small form factor transceiver - Converts electrical signals to optical signals - Data transfer of 10 Gbps - Newer transceiver type that replaces GBIC - Modular (hot swappable) interface - Converts optical signals to electrical signals - Fixed physical interface - Data transfer of 1 Gbps
- Small form factor transceiver - Converts electrical signals to optical signals - Newer transceiver type that replaces GBIC - Modular (hot swappable) interface - Converts optical signals to electrical signals - Data transfer of 1 Gbps
Which of the following answers refer to examples of network layer header data? (Select 2 answers) - Source IP address - Destination IP address - Source port number - Destination port number
- Source IP address - Destination IP address
Which of the following answers refer to the OSI layer 2 header data? (Select 2 answers) - Destination port number - Source MAC address - Destination MAC address - Source port number
- Source MAC address - Destination MAC address
Which of the following network topologies is most commonly used in contemporary Ethernet LANs? - Bus topology - Star topology - Ring topology - Mesh topology
- Star topology
Which of the following allows to determine which network segment an IP address belongs to? - Physical address - Dynamic Host Configuration Protocol (DHCP) - Address Resolution Protocol (ARP) - Subnet mask
- Subnet mask
Which of the answers listed below refers to a data link device designed to forward frames between network segments? - Hub - Switch - Firewall - Router
- Switch
Which of the answers listed below refers to a data link layer device designed to forward frames between network segments? - Hub - Switch - Firewall - Router
- Switch
Post Office Protocol v3 (POP3) uses: - TCP port 110 - UDP port 123 - TCP port 143 - UDP port 161
- TCP port 110
Which port enables the FTP's Data Connection for sending file data? - UDP port 20 - TCP port 20 - UDP port 21 - TCP port 21
- TCP port 20
SSH protocol runs on: - TCP port 21 - UDP port 22 - TCP port 20 - TCP port 22
- TCP port 22
A network technician uses Remote Desktop Protocol (RDP) client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection? - TCP port 1720 - TCP port 636 - TCP port 3389 - TCP port 445
- TCP port 3389
Which of the following answers refer to the characteristic features of bus topology? (Select 3 answers) - Each network node connects to exactly two other nodes - The main network cable becomes a single point of failure - Data is passed through each intermediate node until the receiver node is reached - All network nodes connect to a single central cable (a.k.a. backbone or trunk) - Each node becomes a network's single point of failure - A terminator at each end of the main network cable prevents collisions caused by signal bounce
- The main network cable becomes a single point of failure - All network nodes connect to a single central cable (a.k.a. backbone or trunk) - A terminator at each end of the main network cable prevents collisions caused by signal bounce
What are the characteristic features of the 10BASE-T Ethernet standard? (Select 3 answers) - BNC connector - Transfer rate of 10 Mbps over two-pair Category 3 or better UTP cable - Maximum cable segment length of 100 meters - RJ45 connector - Transfer rate of 100 Mbps over two-pair Category 5 or better UTP cable - Maximum cable segment length of 185 meters
- Transfer rate of 10 Mbps over two-pair Category 3 or better UTP cable - Maximum cable segment length of 100 meters - RJ45 connector
Which of the answers listed below refer to the characteristics of multimode fiber optics? (Select 3 answers) - Uses laser as the source of light - Transmission distances of up to 2 km - More expensive than single-mode fiber optics - Transmission distances of up to 100 km - Less expensive than single-mode fiber optics - Uses LED as the source of light
- Transmission distances of up to 2 km - Less expensive than single-mode fiber optics - Uses LED as the source of light
A double colon in an IPv6 address indicates that part of the address containing only zeros has been compressed to make the address shorter. - True - False
- True
A type of network topology that combines two or more differing standard network topologies is referred to as a hybrid network topology. - True - False
- True
An IP address that doesn't correspond to any actual physical network interface is called a virtual IP address (VIP/VIPA). - True - False
- True
Automatic Private IP Addressing (APIPA) allows a Windows host to self-configure an IPv4 address and subnet mask when Dynamic Host Configuration Protocol (DHCP) is unavailable. APIPA uses an address block range between 169.254.0.0 and 169.254.255.255. APIPA-assigned addresses are valid only for communications within a network segment that a given host is connected to (a host with APIPA-assigned address cannot connect to the Internet). - True - False
- True
Category 7 is a twisted-pair cabling standard featuring improved specifications for canceling crosstalk and system noise. As in Cat 6a, Cat 7 cabling offers 10 Gbps data transfer rate over a cable segment length of 100 meters in 10GBASE-T networks. Category 7 standard introduces new connector types (the GG45 and TERA connector). Cat 7 cabling has not seen a widespread consumer market adoption yet, because all manufacturers of active equipment and network cards prefer Cat 6a standard which offers similar performance and takes advantage of the traditional RJ45 connector. - True - False
- True
In 10GBASE-T networks, Category 6 (Cat 6) UTP cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas Cat 6a (augmented) cabling allows for 10 Gbps data transfer rate over a cable segment length of 100 meters. - True - False
- True
In a network using subnets, the term "Default gateway" refers to a network device that enables exchange of data between hosts residing in different subnets. - True - False
- True
In the OSI model, the payload data (a.k.a. user data) is the actual data that is being nested between header and tail control information. - True - False
- True
Secure File Transfer Protocol (SFTP) is an extension to the Secure Shell (SSH) protocol and runs by default on TCP port 22. - True - False
- True
The 66 block (older type/primarily used in analog telephone systems) and the 110 block (newer type/used in computer networks) are examples of punchdown blocks used for connecting sets of wires. - True - False
- True
The Internet is an example of a large public WAN. - True - False
- True
The general feature of all twisted-pair cabling types is that wires inside the cable are grouped into pairs and wires in each pair are twisted around each other to reduce signal interference from adjacent wire pairs (effect known as crosstalk). - True - False
- True
The main difference between the UTP and STP cabling is that STP cable takes advantage of additional protective cover reducing signal interference from outside sources. - True - False
- True
The shape and angle of the tip of a fiber-optic connector can have an impact on the performance of a fiber-optic communication link. The two basic types of fiber end are Ultra Physical Contact (UPC) and Angled Physical Contact (APC). In the UPC-type connector, the connector end is polished with no angle, while APC connectors feature a fiber end polished at an 8-degree angle, which results in better performance. - True - False
- True
The term "Dual-stack IP" refers to a solution that relies on implementing both IPv4 and IPv6 protocol stacks on various network devices to facilitate seamless migration from IPv4 to IPv6. - True - False
- True
Which of the IPsec modes provides entire packet encryption? - Tunnel - Payload - Transport - Default
- Tunnel
Which of the answers listed below refer(s) to UTP cabling? (Select all that apply) - Twisted-pair copper cabling - Used in Ethernet networks and telephone systems - Low cost and ease of installation - Takes advantage of additional protective cover reducing signal interference from outside sources - Coaxial cabling - Not surrounded by any shielding that would provide protection against interference from outside sources - Fiber-optic cabling - In Ethernet networks, installed with RJ45 connector type
- Twisted-pair copper cabling - Used in Ethernet networks and telephone systems - Low cost and ease of installation - Not surrounded by any shielding that would provide protection against interference from outside sources - In Ethernet networks, installed with RJ45 connector type
Which of the protocols listed below reside at the OSI transport layer? - UDP - IP - SSL/TLS - ICMP - TCP - ATM
- UDP - TCP
Which of the protocols listed below reside at the OSI transport layer? (Select 2 answers) - UDP - IP - SSL/TLS - ICMP - TCP - ATM
- UDP - TCP
Dynamic Host Configuration Protocol (DHCP) runs on: (Select 2 answers) - UDP port 53 - UDP port 67 - UDP port 68 - UDP port 69 - UDP port 161
- UDP port 67 - UDP port 68
A type of network traffic intended for a single host identified by a unique IP address is referred to as: - Unicast - Anycast - Multicast - Broadcast
- Unicast
Which of the answers listed below refer to the RJ11 connector? (Select 2 answers) - Used with telephone cabling - Twisted-pair copper cabling connector - Used with Ethernet network cabling - Fiber-optic cabling connector - Coaxial cabling connector
- Used with telephone cabling - Twisted-pair copper cabling connector
Which of the following answers refer to the 100BASE-SX standard? (Select 3 answers) - Uses LED as the source of light - Multimode fiber - Maximum cable segment length of up to 2 kilometers - Single-mode fiber - Uses laser as the source of light
- Uses LED as the source of light - Multimode fiber - Maximum cable segment length of up to 300 meters
Which of the following answers refer to the characteristic features of the 40GBASE-T Ethernet standard? (Select 3 answers) - Uses all four pairs of wires in a cable for data transmission - Twisted-pair copper cabling - 40 Gbps transfer rate over a maximum cable segment length of 30 meters (Cat 8 cabling) - Single-mode fiber-optic cable - 40 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 8 cabling) - Uses two pairs of wires in a cable for data transmission - 40 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 7 cabling) - Multimode fiber-optic cable
- Uses all four pairs of wires in a cable for data transmission - Twisted-pair copper cabling - 40 Gbps transfer rate over a maximum cable segment length of 30 meters (Cat 8 cabling)
Which of the following answers refer to the 10GBASE-SR Ethernet standard? (Select 3 answers) - Uses laser as the source of light - Multimode fiber - Maximum cable segment length of up to 400 meters - Uses LED as the source of light - Maximum cable segment length of up to 10 kilometers - Single-mode fiber
- Uses laser as the source of light - Multimode fiber - Maximum cable segment length of up to 400 meters
What are the characteristic features of the 10GBASE-LR Ethernet standard? (Select 3 answers) - Uses laser as the source of light - Single-mode fiber - Maximum cable segment length of up to 10 kilometers - Uses LED as the source of light - Maximum cable segment length of up to 400 meters- - Multimode fiber
- Uses laser as the source of light - Single-mode fiber - Maximum cable segment length of up to 10 kilometers
What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes? - DNAT - VLSM - MPLS - VLAN
- VLSM
A computer network connecting multiple smaller networks over very large geographical areas is known as: - PAN - WLAN - MAN - WAN
- WAN
A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called: - MAN - WLAN - LAN - VLAN
- WLAN
Layer 2 of the OSI model is also referred to as what?
Data link layer
The Physical layer of the OSI model is also known as?
Layer 1
Which of the following terms refers to the OSI network layer?
Layer 3
Layer 4 of the OSI model is also known as what?
Transport layer